WastedLocker

WastedLocker is a ransomware family attributed to Indrik Spider that has been used since at least May 2020. WastedLocker has been used against a broad variety of sectors, including manufacturing, information technology, and media.[1][2][3]

ID: S0612
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security
Version: 1.1
Created: 20 May 2021
Last Modified: 25 March 2024

Techniques Used

Domain ID Name Use
Enterprise T1112 修改注册表

WastedLocker can modify registry values within the Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap registry key.[2]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

WastedLocker created and established a service that runs until the encryption process is complete.[2]

Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

WastedLocker has performed DLL hijacking before execution.[2]

Enterprise T1140 反混淆/解码文件或信息

WastedLocker's custom cryptor, CryptOne, used an XOR based algorithm to decrypt the payload.[2]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

WastedLocker has used cmd to execute commands on the system.[2]

Enterprise T1120 外围设备发现

WastedLocker can enumerate removable drives prior to the encryption process.[3]

Enterprise T1486 数据加密以实现影响

WastedLocker can encrypt data and leave a ransom note.[1][2][3]

Enterprise T1083 文件和目录发现

WastedLocker can enumerate files and directories just prior to encryption.[2]

Enterprise T1222 .001 文件和目录权限修改: Windows File and Directory Permissions Modification

WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command.[2]

Enterprise T1106 本机API

WastedLocker's custom crypter, CryptOne, leveraged the VirtualAlloc() API function to help execute the payload.[2]

Enterprise T1012 查询注册表

WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces.[2]

Enterprise T1027 .001 混淆文件或信息: Binary Padding

WastedLocker contains junk code to increase its entropy and hide the actual code.[2]

.013 混淆文件或信息: Encrypted/Encoded File

The WastedLocker payload includes encrypted strings stored within the .bss section of the binary file.[2]

Enterprise T1548 .002 滥用权限提升控制机制: Bypass User Account Control

WastedLocker can perform a UAC bypass if it is not executed with administrator rights or if the infected host runs Windows Vista or later.[2]

Enterprise T1490 系统恢复抑制

WastedLocker can delete shadow volumes.[1][2][3]

Enterprise T1569 .002 系统服务: Service Execution

WastedLocker can execute itself as a service.[2]

Enterprise T1135 网络共享发现

WastedLocker can identify network adjacent and accessible drives.[3]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

WastedLocker checked if UCOMIEnumConnections and IActiveScriptParseProcedure32 Registry keys were detected as part of its anti-analysis technique.[2]

Enterprise T1564 .001 隐藏伪装: Hidden Files and Directories

WastedLocker has copied a random file from the Windows System32 folder to the %APPDATA% location under a different hidden filename.[2]

.004 隐藏伪装: NTFS File Attributes

WastedLocker has the ability to save and execute files as an alternate data stream (ADS).[3]

Groups That Use This Software

ID Name References
G0119 Indrik Spider

[2][4][5][6]

References